1) Configuration management is an essential part of the system maintenance. It is aided with version control tools to control versions, semi-version or patch management. a. True b. False
|
||||
2) Which model is also known as Verification and validation model? a. Waterfall model b. Big Bang model c. V-model d. Spiral model
|
||||
3) Software project management is the process of managing all activities that are involved in software development, they are _____ . a. Time b. Cost c. Quality management d. All mentioned above
|
||||
4) A small picture representing an associated application, what does it mean? a. Icon b. Window c. Menu d. Cursor
|
||||
5) What is the meaning of requirement elicitation in software engineering? a. Gathering of requirement. b. Understanding of requirement. c. Getting the requirements from client. d. All of the above.
|
||||
6) Which of the following is/are Project Estimation Technique? a. Empirical Estimation Technique. b. Heuristic Estimation Technique. c. Analytical Estimation Technique. d. All of the above.
|
||||
7) The maximum number of objects that can participate in a relationship is called________ . a. Cardinality b. Attributes c. Operations d. Transformers
|
||||
8) What is legacy system? a. A legacy system refers to newer version of software. b. A legacy system refers to outdated application software that is used instead of available upgraded versions. c. A legacy system always devolved by advance technology. d. None of the above.
|
||||
9) Which of the following cannot be applied with the software according to Software Engineering Layers? a. Process b. Methods c. Manufacturing d. None of the above.
|
||||
10) Which software is used to control products and systems for the consumer and industrial markets? a. System software b. Artificial intelligence software c. Embedded software d. Engineering and scientific software
|
||||
11) Which software enables the program to adequately manipulate information? a. Instructions b. Data Structures c. Documents d. All of the above
|
||||
12) Which coding element is generally omitted at the end of line? a. Naming conventions b. Identifying c. Whitespace d. Operators
|
||||
13) The rules of writing 'if-then-else', 'case-switch', 'while-until' and 'for' control flow statements are called _____ . a. Comments b. Functions c. Line length and wrapping d. Control Structure
|
||||
14) If an application allows executing multiple instances of itself, they appear on the screen as separate windows are called ______ . a. Window b. Tabs c. Menu d. Cursor
|
||||
15) From the following, which software has been characterized by 'Number Crunching' Algorithms? a. System software b. Artificial intelligence software c. Embedded software d. Engineering and scientific software
|
||||
16) IEEE provides a standard as IEEE 830-1993. For which activity this standard is recommended standard? a. Software requirement specification. b. Software design. c. Testing. d. Both a and b
|
||||
17) A generic process framework for software engineering encompasses five activities. What are those activities? a. Communication, risk management, measurement, production, deployment. b. Communication, Planning, Modeling, construction, deployment. c. Analysis, designing, programming, debugging, maintenance d. None of the above.
|
||||
18) Who deliver the technical skills that are necessary to engineer for a product or an application? a. Project managers b. Practitioners c. Customers d. End users
|
||||
19) Project risk factor is considered in which model? a. Spiral model. b. Waterfall model. c. Prototyping model d. None of the above.
|
||||
20) What is a child window that contains message for the user and request for some action to be taken? a. Dialogue box b. Text-Box c. Check-Box d. Radio Button
|